Unauthenticated Remote Code Execution in n8n Workflow Automation Platform
CVE-2026-42228
What is CVE-2026-42228?
The n8n Workflow Automation Platform contains a vulnerability in the /chat WebSocket endpoint used by the Chat Trigger node's Hosted Chat feature. Versions prior to 1.123.32, 2.17.4, and 2.18.1 lack proper authorization checks for incoming connections. As a result, an unauthenticated remote attacker can identify a valid execution ID for a workflow that is waiting to be executed, potentially allowing them to attach to that execution and receive sensitive information intended for the legitimate user. Furthermore, the attacker can submit arbitrary input, thereby influencing or resuming the downstream workflow's behavior. This flaw has been resolved in the latest versions, underscoring the importance of updating to maintain the security of the system.
Affected Version(s)
n8n < 1.123.32 < 1.123.32
n8n >= 2.17.0, < 2.17.4 < 2.17.0, 2.17.4
n8n >= 2.18.0, < 2.18.1 < 2.18.0, 2.18.1
